Operationally Necessary Cookies
“‘Do what’s best for the job seeker.’ This has been Indeed’s guiding principle since the beginning. One way we put the job seeker first is by keeping their information safe and secure. We always consider the security of our systems as we develop the services that millions of people use every day. But someone will outsmart us. Hackers are always trying out new ways of bypassing security and gaining access to systems and information. Our challenge: to bring these security experts over to our side and benefit from their findings. Our answer to this challenge is, well, money. Actually, money and fame. Indeed offers security testers a legitimate route to reporting their findings, and we award them for their time with cold, hard cash and recognition. Through our bug bounty program we have awarded over 300 submissions in the past year and a half, with payouts as high as $5,000 for the most severe bugs. Our most successful participants (looking at you, Angrylogic, Avlidienbrunn, and Mongo) have earned cash while building their reputations as highly regarded testers for Indeed.”
Prior to our bug bounty program, we occasionally received messages that sounded like blackmail. An anonymous person would contact us, insisting that we pay them, or they would publicly release the details of an unspecified, but totally serious, security bug. These individuals expected payment up front, with no guarantee that they even had a bug to expose. While we’re happy to compensate researchers for helping us improve our services, we didn’t want to encourage this coercive behavior. It felt wrong.
To solve the mutual distrust, we started using Bugcrowd.com as an impartial arbiter. On Bugcrowd, security researchers are more willing to provide evidence up front, giving us the chance to fairly assess the bug’s severity. Indeed can now provide rewards without abuse, and everyone lives happily ever after…
Read the full blog post on Indeed’s Bug Bounty Program.
Empower Your Security Team With a Crowd of White Hat Hackers to Find and Fix Vulnerabilities in Your Code Before the Bad Guys Do.
From Our BlogSeptember 26, 2020A Byte-ful with TomNomNomSeptember 24, 2020Bugcrowd’s October Challenge Month!September 23, 2020Can the Crowd Handle Network Pen Testing?MORE BLOG POSTSNewsSeptember 16, 2020Beyond Compliance: Bugcrowd Leverages Crowdsourcing to Find Server Vulnerabilities Before Cybercriminals DoSeptember 9, 2020Legality of Security Research to be Decided in US Supreme Court CaseSeptember 9, 2020Bugcrowd Expands its Advisory Board with the Appointment of Two Distinguished Industry ExecutivesMORE NEWSEventsByteCon2020- September 21-25, 2020ByteCon is a community driven framework organized by Byter Cyber Labs for building online events…Connect With UsDarkCTF – September 25-27, 2020DarkArmy is a non-profit and diverse community of students and cybersecurity enthusiasts from all across…Connect With UsSecurity Flash with ActiveCampaign: How to Build Trust in a Time of Global UncertaintyHow do you build trust and confidence during a time of economic turbulence? We’re living…Connect With UsMORE EVENTS
MORE BLOG POSTS
ByteCon is a community driven framework organized by Byter Cyber Labs for building online events…
DarkArmy is a non-profit and diverse community of students and cybersecurity enthusiasts from all across…
How do you build trust and confidence during a time of economic turbulence? We’re living…
Stay current with the latest security trends from Bugcrowd